2020
DOI: 10.1016/j.cose.2020.101721
|View full text |Cite
|
Sign up to set email alerts
|

Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
84
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 56 publications
(84 citation statements)
references
References 22 publications
0
84
0
Order By: Relevance
“…In this method, a malware controls the electromagnetic emission from a computer and modulates data on top of it. It also have been shown that attackers can exfiltrate data from air-gapped computers using ultrasound, magnetic signals, and even heat emission [3]- [6].…”
Section: A Air-gap Exfiltrationmentioning
confidence: 99%
See 2 more Smart Citations
“…In this method, a malware controls the electromagnetic emission from a computer and modulates data on top of it. It also have been shown that attackers can exfiltrate data from air-gapped computers using ultrasound, magnetic signals, and even heat emission [3]- [6].…”
Section: A Air-gap Exfiltrationmentioning
confidence: 99%
“…In 2014, Guri et al introduced AirHopper [4], [7], a malware that exploits the FM radio signals emanating from the video card to leak data to a nearby smartphone receiver. Guri et al also presented GSMem [8], a malware that exploits the electromagnetic emission at GSM, UMTS, and LTE frequencies for air gap exfiltration. The data modulated over the emission can be picked by a low level malware residing in the baseband firmware of a nearby mobile phone.…”
Section: A Electromagnetic Magnetic Acoustic and Thermalmentioning
confidence: 99%
See 1 more Smart Citation
“…Hanspach and Goetz [12] present a method for near-ultrasonic covert networking using speakers and microphones. Fansmitter and Diskfiltration [13], [14] are another methods of acoustic data exfiltration from computers without loudspeakers. BitWhisper [15] demonstrates a covert communication channel between adjacent air-gapped computers by using their heat emissions and built-in thermal sensors.…”
Section: Related Workmentioning
confidence: 99%
“…2) GSMem: Similar to AirHopper, the GSMem attack [50], enables leaking the data from air-gapped wallets to nearby mobile phones. In this technique malware generates interferences in the cellular bands of the GSM, UMTS, and LTE specification.…”
Section: Unsigned Transaction/ Wallet Installationmentioning
confidence: 99%